Default Cover Image

2023 6th International Conference on Information and Computer Technologies (ICICT)

March 24 2023 to March 26 2023

Raleigh, NC, USA

ISBN: 979-8-3503-0095-6

Table of Contents

Title Page iFreely available from IEEE.pp. 1-1
Title Page iiiFreely available from IEEE.pp. 3-3
Copyright PageFreely available from IEEE.pp. 4-4
Table of ContentsFreely available from IEEE.pp. 5-9
PrefaceFreely available from IEEE.pp. 10-10
Conference OrganizationFreely available from IEEE.pp. 11-11
Technical Program CommitteeFreely available from IEEE.pp. 12-12
Human Wellness in the Cape Fear River Basin Based on CAFO DataFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
Comparison of Machine and Deep Learning Models for the Prediction of Land DegradationFull-text access may be available. Sign in or learn about subscription options.pp. 5-12
Research on Supermarket Marketing Data Analysis Based on Business IntelligenceFull-text access may be available. Sign in or learn about subscription options.pp. 22-28
Rainfall Forecasting with Variational Autoencoders and LSTMsFull-text access may be available. Sign in or learn about subscription options.pp. 35-40
Using Artificial Intelligence to Detect FallsFull-text access may be available. Sign in or learn about subscription options.pp. 41-44
Web Injection and Banking Trojan Malware -A Systematic Literature ReviewFull-text access may be available. Sign in or learn about subscription options.pp. 45-53
Time-series method for predicting human traffic flow: A case study of Cañar, EcuadorFull-text access may be available. Sign in or learn about subscription options.pp. 54-59
SE-RCN: An Economical Capsule NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 60-65
Human Tissue Cell Image Segmentation optimization Algorithm Based on Improved U-net NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 66-71
Printed Circuit Board Defect Detection Based on Improved YOLOv5Full-text access may be available. Sign in or learn about subscription options.pp. 72-77
AG-UN-Net: U-shaped and N-shaped network with attention gate for liver segmentationFull-text access may be available. Sign in or learn about subscription options.pp. 78-83
A Combined Method for Face RecognitionFull-text access may be available. Sign in or learn about subscription options.pp. 84-88
Design Methodology for Single-Channel CNN-Based FER SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 89-94
Lung Cancer Classification and Prediction of Disease Severity Score Using Deep LearningFull-text access may be available. Sign in or learn about subscription options.pp. 100-104
Long Text Classification Using Pre-trained Language Model for a Low-Resource LanguageFull-text access may be available. Sign in or learn about subscription options.pp. 115-120
Detecting Fake News Using Machine Learning Based ApproachesFull-text access may be available. Sign in or learn about subscription options.pp. 121-126
On Detecting Crypto Ransomware Attacks: Can Simple Strategies be Effective?Full-text access may be available. Sign in or learn about subscription options.pp. 138-143
Consideration for Creation of Training Samples for Targeted Malware Detection by Machine LearningFull-text access may be available. Sign in or learn about subscription options.pp. 144-149
Risk Assessment of Cloud Infrastructure and Services for Software Development StartupsFull-text access may be available. Sign in or learn about subscription options.pp. 150-155
Development of Build–MaaS Architecture, a Mobility-as-a-Service platform for the Construction SectorFull-text access may be available. Sign in or learn about subscription options.pp. 156-161
A Solution to Channel Aging in 5G Massive MIMOFull-text access may be available. Sign in or learn about subscription options.pp. 162-166
Deployment of Proposed EfficientNeXt on NXP i.MX 8M MiniFull-text access may be available. Sign in or learn about subscription options.pp. 167-170
Adaptive Handover Decision Algorithm for Load Balancing in 5G Heterogeneous NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 177-181
mpiPython: Prospects for Node PerformanceFull-text access may be available. Sign in or learn about subscription options.pp. 182-187
A Content-Based Dataset Recommendation System for Biomedical DatasetsFull-text access may be available. Sign in or learn about subscription options.pp. 198-202
Representation Theorems Obtained by Mining across Web Sources for HintsFull-text access may be available. Sign in or learn about subscription options.pp. 203-210
Blockchain-based Certificate Management with Multi-Party AuthenticationFull-text access may be available. Sign in or learn about subscription options.pp. 211-219
Image-Based Indoor Localization Using Smartphone Cameras In Textureless EnvironmentFull-text access may be available. Sign in or learn about subscription options.pp. 226-231
Ethical implications of using artificial intelligence for multimodal biometric selection model evaluationFull-text access may be available. Sign in or learn about subscription options.pp. 232-238
Author IndexFreely available from IEEE.pp. 239-240
Showing 46 out of 46